Pernul Günther
Pernul Günther
Professor für Wirtschaftsinformatik, Universität Regensburg
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
C Lambrinoudakis, S Gritzalis, F Dridi, G Pernul
Computer communications 26 (16), 1873-1883, 2003
Ethertwin: Blockchain-based secure digital twin information management
B Putz, M Dietz, P Empl, G Pernul
Information Processing & Management 58 (1), 102425, 2021
Authentication and authorization infrastructures (AAIs): a comparative survey
J Lopez, R Oppliger, G Pernul
Computers & Security 23 (7), 578-590, 2004
Roles in information security–a survey and classification of the research area
L Fuchs, G Pernul, R Sandhu
computers & security 30 (8), 748-769, 2011
Security operations center: A systematic study and open challenges
M Vielberth, F Böhm, I Fichtinger, G Pernul
Ieee Access 8, 227756-227779, 2020
A pattern system for access control
T Priebe, EB Fernández, JI Mehlau, G Pernul
Research Directions in Data and Applications Security XVIII: IFIP TC11/WG11 …, 2004
Towards OLAP security design—survey and research issues
T Priebe, G Pernul
Proceedings of the 3rd ACM International Workshop on Data Warehousing and …, 2000
Viewing business-process security from different perspectives
G Herrmann, G Pernul
International Journal of Electronic Commerce 3 (3), 89-103, 1999
A pragmatic approach to conceptual modeling of OLAP security
T Priebe, G Pernul
Conceptual Modeling—ER 2001: 20th International Conference on Conceptual …, 2001
Digital twin: Empowering enterprises towards a system-of-systems approach
M Dietz, G Pernul
Business & Information Systems Engineering 62, 179-184, 2020
SSIBAC: self-sovereign identity based access control
R Belchior, B Putz, G Pernul, M Correia, A Vasconcelos, S Guerreiro
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
A distributed ledger approach to digital twin secure data sharing
M Dietz, B Putz, G Pernul
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
Why have public key infrastructures failed so far?
J Lopez, R Oppliger, G Pernul
Internet Research 15 (5), 544-556, 2005
Towards integrative enterprise knowledge portals
T Priebe, G Pernul
Proceedings of the twelfth international conference on Information and …, 2003
Measuring and visualizing cyber threat intelligence quality
D Schlette, F Böhm, M Caselli, G Pernul
International Journal of Information Security 20, 21-38, 2021
A comparative study on cyber threat intelligence: The security incident response perspective
D Schlette, M Caselli, G Pernul
IEEE Communications Surveys & Tutorials 23 (4), 2525-2556, 2021
Trust, privacy and security in e-business: Requirements and solutions
SK Katsikas, J Lopez, G Pernul
Panhellenic Conference on Informatics, 548-558, 2005
Ontology-based integration of OLAP and information retrieval
T Priebe, G Pernul
14th International Workshop on Database and Expert Systems Applications …, 2003
Generating user-understandable privacy preferences
J Kolter, G Pernul
2009 International Conference on Availability, Reliability and Security, 299-306, 2009
Integrating digital twin security simulations in the security operations center
M Dietz, M Vielberth, G Pernul
Proceedings of the 15th International Conference on Availability …, 2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20